{"title":"物联网入侵检测系统特征选择与深度学习技术","authors":"Bhawana Sharma, L. Sharma, Chhagan Lal","doi":"10.1007/978-981-16-3802-2_21","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":135529,"journal":{"name":"Proceedings of International Conference on Computational Intelligence","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Feature Selection and Deep Learning Technique for Intrusion Detection System in IoT\",\"authors\":\"Bhawana Sharma, L. Sharma, Chhagan Lal\",\"doi\":\"10.1007/978-981-16-3802-2_21\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":135529,\"journal\":{\"name\":\"Proceedings of International Conference on Computational Intelligence\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of International Conference on Computational Intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1007/978-981-16-3802-2_21\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of International Conference on Computational Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/978-981-16-3802-2_21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}